Publications
Export 620 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is T [Clear All Filters]
2000. On the efficiency of local decoding procedures for error-correcting codes. Proceedings of the thirty-second annual ACM symposium on Theory of computing. :80-86.
1995. Efficient Algorithms for Atmospheric Correction of Remotely Sensed Data. Supercomputing, 1995. Proceedings of the IEEE/ACM SC95 Conference. :12-12.
2002. Efficient instrumentation for code coverage testing. ACM SIGSOFT Software Engineering Notes. 27:86-96.
2008. Efficient Integrity Checking of Untrusted Network Storage. StorageSS '08 Proceedings of the 4th ACM International Workshop on Storage Security and Survivability . :43-54.
2005. An efficient nearest neighbor algorithm for P2P settings. Proceedings of the 2005 national conference on Digital government research. :21-28.
2004. Empirical-based estimation of the effect on software dependability of a technique for architecture conformance verification. Proceedings of the ICSE 2004 Workshop on Architecting Dependable Systems, Edinburgh, UK.
2012. Encouraging consistent translation choices. Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. :417–426.
2011. Entropy rate superpixel segmentation. 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :2097-2104.
2000. Evaluating multi-threading in the prototype XMT environment. Proc. 4th Workshop on Multi-Threaded Execution, Architecture and Compliation (MTEAC2000).
2007. Evaluation of Traditional and Shock-Confining LES Filters using DNS Data of Compressible Turbulence. Proceedings of 18th AIAA Computational Fluid Dynamics Conference.
2001. An experience management system for a software engineering research organization. Software Engineering Workshop, 2001. Proceedings. 26th Annual NASA Goddard. :29-35.
2010. Exploring the Relationships among ICTs: A Scalable Computational Approach Using KL Divergence and Hierarchical Clustering. Hawaii International Conference on System Sciences. :1-10.
2008. Extended abstract: A hardware-assisted data hiding based approach in building high performance secure execution systems. Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on. :93-96.
2010. Fast directional chamfer matching. Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on. :1696-1703.
1999. Fkpurang, darsana, traum, cfa, perlisg@ cs. umd. edu. In Proceedings of the IJCAI’99 Workshop on Practical Reasoning and Rationality.
2008. A Framework for Software Engineering Experimental Replications. Engineering of Complex Computer Systems, 2008. ICECCS 2008. 13th IEEE International Conference on. :203-212.
2007. From Videos to Verbs: Mining Videos for Activities using a Cascade of Dynamical Systems. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
2010. General-purpose vs. gpu: Comparison of many-cores on irregular workloads. Proceedings of the Second Usenix Workshop on Hot Topics in Parallelism. :14-15.
2011. Helping Users Shop for ISPs with Internet Nutrition Labels. ACM SIGCOMM Workshop on Home Networks '11. :13-18.
2011. Helping Users Shop for ISPs with Internet Nutrition Labels. ACM SIGCOMM Workshop on Home Networks '11. :13-18.